Databases Reference
In-Depth Information
120. J. Smith and C. Dodge. Developments in steganography. In A. Pfitzmann,
editor,
Proceedings of the third Int. Workshop on Information Hiding
, pages
77-87, Dresden, Germany, September 1999. Springer Verlag.
121. D. Xiaodong Song, D. Wagner, and A. Perrig. Practical techniques for searches
on encrypted data. In
SP '00: Proceedings of the 2000 IEEE Symposium on
Security and Privacy (S&P 2000)
. IEEE Computer Society, 2000.
122. J. Stern. A new and ecient all-or-nothing disclosure of secrets protocol. In
Proceedings of Asia Crypt
, pages 357-371, 1998.
123. Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems.
Computer
, 25(1):39-52, 1992.
124. C. P. Wright, M. Martino, and E. Zadok. NCryptfs: A Secure and Convenient
Cryptographic File System. In
Proceedings of the Annual USENIX Technical
Conference
, pages 197-210, San Antonio, TX, June 2003. USENIX Association.
125. Nan Zhang and Wei Zhao. Distributed Privacy Preserving Information Sharing.
In
Proceedings of the International Conference on Very Large Databases VLDB
,
2005.